Compromise Hardware Supply Chain - T1474.002 (c08366bb-8d11-4921-853f-f0a3b6a2a1da)
Adversaries may manipulate hardware components in products prior to receipt by a final consumer for the purpose of data or system compromise. By modifying hardware or firmware in the supply chain, adversaries can insert a backdoor into consumer networks that may be difficult to detect and give the adversary a high degree of control over the system.
Cluster A | Galaxy A | Cluster B | Galaxy B | Level |
---|---|---|---|---|
Supply Chain Compromise - T1474 (0d95940f-9583-4e0f-824c-a42c1be47fad) | Attack Pattern | Compromise Hardware Supply Chain - T1474.002 (c08366bb-8d11-4921-853f-f0a3b6a2a1da) | Attack Pattern | 1 |